Trifid Ciphers

Trifid Ciphers

Trifid Ciphers Trifid ciphers are examples of combination ciphers: The encryption process consists of a sequence of several different techniques. In this case substitution followed by fractionation and transposition are used in the encryption. The trifid cipher was invented by amateur cryptographer F´elix Delastelle, ca. 1900. The encryption key for a trifid cipher consists of a positive integer (the period) and a 3×3×3 array containing all of the distinct letters of the English alphabet plus one additional character. Typically, the additional character in the array is a symbol, such as a dot. The arrangement of the characters in the key array can be chosen at random. Below is the 3D example of an encryption key: A more basic way of looking at the above graph in a 2D form is by looking at the 3 layers, bottom to top, then numbering them from 1 to 3. Compare the 3D graph to the layers below. Layer 1 Layer 2 Layer 3 1 2 3 1 2 3 1 2 3 1 Y G U 1 F L K 1 . E J 2 Q O M 2 I H A 2 X P D 3 S V B 3 Z R W 3 C N T Suppose we want to encrypt the message “trick or treat” using a trifid cipher with encryption key consisting of period 4 and the above layers. i. Represent the letters in our message “trick or treat” with their coordinates in the encryption array: T R I C K O R T R E A T 333 232 221 331 213 122 232 333 232 312 223 333 Layer Row Column How to describe the position Number Number Number of the letter K on the chart. ii. Now arrange these coordinates in columns and separate the columns into groups of 4 (since the period is defined as 4). 3 2 2 3 2 1 2 3 2 3 2 3 3 3 1 3 1 2 3 3 3 1 2 3 3 2 2 1 3 2 2 3 2 2 3 3 This is the position of K written vertically iii. Concatenate the rows of each group successively – match the pattern from part ii with what you see below: 3223 3313 3221 2123 1233 3223 2323 3123 2233 iv. Finally, taking the digits in the string from step iii in groups of 3, 322 333 133 221 212 312 333 223 232 331 232 233 use the key array to replace each group with its corresponding character to obtain the ciphertext – go back to the charts and note that “322” corresponds to “P” in the chart from layer 2: P T B I L E T A R C R W Notice that at the end of step i, essentially, we have the result of a substitution cipher. However, instead of replacing each single character with a single symbol, it is replaced by 3 digits. In the subsequent steps these digits are separated and mixed with the digits obtained from other plaintext characters (fractionation and transposition). Layer 1 Layer 2 Layer 3 1 2 3 1 2 3 1 2 3 1 X P Q 1 C T N 1 R D E 2 L M H 2 K J Z 2 . F G 3 W I V 3 S U O 3 Y A B The following ciphertext was produced using a trifid cipher with period 4 and the above encryption array. B O Y C W C D H B G Q E G A J X See if you can decrypt it (Answer: Yay Spring Break) Separately, substitution and transposition ciphers have obvious vulnerabilities. When both are combined with fractionation, as in the trifid cipher, these vulnerabilities are lessened considerably. However, crypt-analysis of the trifid cipher is sufficiently effective so that its use for sensitive messages is ill-advised. Even though implementation is easy, (it can be done with pencil and paper), and security is better than many other pencil and paper ciphers, practical use of the trifid cipher has been infrequent. It is significant as a link between the classical and the modern: Many present-day encryption procedures, (e.g. AES), consist of more complicated, machine-implemented combinations of substitution, fractionation, and transposition. .

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    3 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us